Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Consulting

Hall 6 / Booth Number 6-424

IT Security Analysis & Consulting

Categories

BSI IT baseline protection ISMS (ISO-IEC 2700x / BS 7799) Consulting IT security Education / training / qualification Awareness

Key Facts

  • OT Penetration Testing
  • Offensive Security
  • Website Penetration Testing

Product Description

Attack is the best defence!

With penetration tests, we simulate cyber attacks to identify vulnerabilities in our customers' IT and OT systems and assess potential impacts. On the one hand, penetration tests are an integral part of secure product development in accordance with IEC 62443-4-1, but they also serve to secure systems and infrastructures during operation.

Our test experts are certified ethical hackers who develop and test attacks on industrial automation systems in our OT Security Lab at the ICS site in Berlin, which was set up specifically for these services. Using an extensive tool suite, we carry out automated network and vulnerability scans, apply current attack patterns and, in the interests of completeness, use all the options that a real attacker also has at his disposal.

The results of the penetration tests lead to a prioritised catalogue of measures, the aim of which is the sustainable system hardening of our clients' IT infrastructure and environment. We are also happy to provide active support in closing the identified security gaps.

... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.